vBulletin Fixes Critical Security Vulnerabilities – Patch Before Hackers Exploiting it

VBulletin software is one the most popular and widely used forum software written in PHP, used by a number of organizations.

Now vBulletin has released an important security fix to address one of the critical security vulnerabilities tracked as CVE-2020-12720.

vBulletin powers more than 100,000 websites, considering its popularity, hackers may jump to exploit the vulnerability soon, users are recommended to patch soon.

Last September an anonymous hacker publicly disclosed an unpatched vBulletin forum software pre-auth RCE Zero-day Exploit.

Following that hackers breach many popular forums exploiting the vulnerability(CVE-2019-16759) and accessed sensitive details such as username, name, e-mail address, last IP used to access the forums.

vBulletin software

The vulnerability was found by Charles Fol, a security engineer at Ambionics, the full details of the vulnerability were not disclosed. More details of the vulnerability to be published in the SSTIC conference from June 3-5.

CVE-2020-12720 is an access control vulnerability, Fol tweeted the vulnerability as a critical one.

According to the National Vulnerability Database (NVD), the access control vulnerability affects versions prior to 5.5.6pl1, 5.6.0 before 5.6.0pl1, and 5.6.1 before 5.6.1pl1.

To fix the issue vBulletin has released a new security patch

  • 5.6.1 Patch Level 1
  • 5.6.0 Patch Level 1
  • 5.5.6 Patch Level 1

If you are using a version of vBulletin 5 Connect prior to 5.5.6, it is strongly recommended to upgrade with newer versions.

VBulletin also states that “security patch has already been applied to all vBulletin Cloud sites.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…

1 day ago

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…

2 days ago

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…

2 days ago

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…

2 days ago

Raspberry Robin Employs TOR Network For C2 Servers Communication

Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…

2 days ago

145,000 ICS Systems, Thousands of HMIs Exposed to Cyber Attacks

Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…

2 days ago